- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 510 for apiGroup (0.14 sec)
-
pkg/registry/admissionregistration/validatingadmissionpolicy/authz.go
} paramKind := policy.Spec.ParamKind // default to requiring permissions on all group/version/resources resource, apiGroup, apiVersion := "*", "*", "*" if gv, err := schema.ParseGroupVersion(paramKind.APIVersion); err == nil { // we only need to authorize the parsed group/version apiGroup = gv.Group apiVersion = gv.Version if gvr, err := v.resourceResolver.Resolve(gv.WithKind(paramKind.Kind)); err == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/apis/resourcequota/v1beta1/types.go
// To consume the resource, there must exist an associated quota that limits // its consumption. type LimitedResource struct { // APIGroup is the name of the APIGroup that contains the limited resource. // +optional APIGroup string `json:"apiGroup,omitempty"` // Resource is the name of the resource this rule applies to. // For example, if the administrator wants to limit consumption
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 04 12:53:52 UTC 2020 - 2.9K bytes - Viewed (0) -
cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml
metadata: name: kubelet-user-npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 08 22:50:41 UTC 2019 - 389 bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage_test.go
[]*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}}, []*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}}, ) role := &rbac.ClusterRole{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 09 13:47:19 UTC 2021 - 6.2K bytes - Viewed (0) -
api/openapi-spec/v3/apis_openapi.json
{ "components": { "schemas": { "io.k8s.apimachinery.pkg.apis.meta.v1.APIGroup": { "description": "APIGroup contains the name, the supported versions, and the preferred version of a group.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 27 20:05:52 UTC 2023 - 7.8K bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrolebinding.yaml
istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: {{ template "name" . }} subjects: - kind: ServiceAccount name: {{ template "name" . }} namespace: {{ .Release.Namespace }} ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 21:52:29 UTC 2024 - 1.9K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1beta1.ClusterRoleBinding.yaml
kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 06 21:25:20 UTC 2022 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1beta1.RoleBinding.json
"fieldsV1": {}, "subresource": "subresourceValue" } ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 06 21:25:20 UTC 2022 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRoleBinding.yaml
kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.RoleBinding.json
"fieldsV1": {}, "subresource": "subresourceValue" } ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.4K bytes - Viewed (0)